-
4
-
-
84893107930
-
-
1991, pp. 127-140
-
T. Habutsu, Y. Nishio, I.Sasase.andS.Mori, "A secret key cryptosystem by iterating a chaotic map," in Proc. Advances in Cryptology-EURO-CRYPT91. Berlin, Germany: Springer-Verlag, 1991, pp. 127-140.
-
Y. Nishio, I.Sasase.andS.Mori, "A Secret Key Cryptosystem by Iterating A Chaotic Map," in Proc. Advances in Cryptology-EURO-CRYPT91. Berlin, Germany: Springer-Verlag
-
-
Habutsu, T.1
-
5
-
-
0030660985
-
-
6, pp. 381-394, 1997
-
Z. Kotulski and J. Szczepanski, "Discrete chaotic cryptography," Ann. Phys., vol. 6, pp. 381-394, 1997.
-
"Discrete Chaotic Cryptography," Ann. Phys., Vol.
-
-
Kotulski, Z.1
Szczepanski, J.2
-
6
-
-
0038938048
-
-
9, pp. 1121-1135, 1999
-
Z. Kotulski, J. Szczepanski, K. Grski, A. Paszkiewicz, and A. Zugaj, "Application of discrete chaotic dynamical systems in cryptography-DCC method,"//. J. Bifurcation Chaos, vol. 9, pp. 1121-1135, 1999.
-
J. Szczepanski, K. Grski, A. Paszkiewicz, and A. Zugaj, "Application of Discrete Chaotic Dynamical Systems in Cryptography-DCC Method,"//. J. Bifurcation Chaos, Vol.
-
-
Kotulski, Z.1
-
7
-
-
0032089417
-
-
8, pp. 1259-1284, 1998
-
J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," Int. J. Bifurcation Chaos, vol. 8, pp. 1259-1284, 1998.
-
"Symmetric Ciphers Based on Two-dimensional Chaotic Maps," Int. J. Bifurcation Chaos, Vol.
-
-
Fridrich, J.1
-
8
-
-
0042786512
-
-
240, pp. 50-54, 1998
-
M. S. Baptista, "Cryptography with chaos," Phys. Lett. A, vol. 240, pp. 50-54, 1998.
-
"Cryptography with Chaos," Phys. Lett. A, Vol.
-
-
Baptista, M.S.1
-
9
-
-
0032666176
-
-
35, pp. 974-975, 1999
-
Y H. Chu and S. Chang, "Dynamical cryptography based on synchronized chaotic systems," Electron. Lett., vol. 35, pp. 974-975, 1999.
-
"Dynamical Cryptography Based on Synchronized Chaotic Systems," Electron. Lett., Vol.
-
-
Chu, Y.H.1
Chang, S.2
-
10
-
-
0345831120
-
-
373-375, 1999
-
E. Alvarez, A. Fernandez, P. Garcia, J. Jimenez, and A. Marcano, "New approach to chaotic encryption," Phys. Lett. A, pp. 373-375, 1999.
-
A. Fernandez, P. Garcia, J. Jimenez, and A. Marcano, "New Approach to Chaotic Encryption," Phys. Lett. A, Pp.
-
-
Alvarez, E.1
-
13
-
-
0001820140
-
-
228, no. 5, pp. 15-33, 1973
-
H. Feistel, "Cryptography and computer privacy," Scientific American, vol. 228, no. 5, pp. 15-33, 1973.
-
"Cryptography and Computer Privacy," Scientific American, Vol.
-
-
Feistel, H.1
-
14
-
-
84985833497
-
-
1990, pp. 229-236
-
L. Brown, J. Pieprzyk, andJ. Seberry, "LOKI: A cryptographic primitive for authentication and secrecy applications," in Proc. Advances in Cryptology-AUSCRYPT90. Berlin, Germany: Springer-Verlag, 1990, pp. 229-236.
-
J. Pieprzyk, AndJ. Seberry, "LOKI: A Cryptographic Primitive for Authentication and Secrecy Applications," in Proc. Advances in Cryptology-AUSCRYPT90. Berlin, Germany: Springer-Verlag
-
-
Brown, L.1
-
15
-
-
0005755797
-
-
12, pp. 71-104, 1997
-
C. Adams, "Constructing symmetric ciphers using the CAST design procedure," Designs, Codes and Cryptography, vol. 12, pp. 71-104, 1997.
-
"Constructing Symmetric Ciphers Using the CAST Design Procedure," Designs, Codes and Cryptography, Vol.
-
-
Adams, C.1
-
16
-
-
84988781914
-
-
Available: http://www.counterpane.com/twofish.html
-
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Freguson. Twofish: A 128-bit block cipher. Online. Available: http://www.counterpane.com/twofish.html
-
J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Freguson. Twofish: A 128-bit Block Cipher. Online.
-
-
Schneier, B.1
-
17
-
-
84863459476
-
-
1995, pp. 97-110
-
M. Blaze and B. Schneier, "The MacGuffin block cipher algorithm," in Fast Software Encryption Second Int. Workshop Proc.. Berlin, Germany: Springer-Verlag, 1995, pp. 97-110.
-
"The MacGuffin Block Cipher Algorithm," in Fast Software Encryption Second Int. Workshop Proc.. Berlin, Germany: Springer-Verlag
-
-
Blaze, M.1
Schneier, B.2
-
18
-
-
84958975323
-
-
1996, pp. 113-120
-
R. Anderson and E. Biham, "Two practical and provably secure block ciphers: BEAR and LION," in Fast Software Encryption, Third Int. Workshop Proc. Berlin, Germany: Springer-Verlag, 1996, pp. 113-120.
-
"Two Practical and Provably Secure Block Ciphers: BEAR and LION," in Fast Software Encryption, Third Int. Workshop Proc. Berlin, Germany: Springer-Verlag
-
-
Anderson, R.1
Biham, E.2
-
20
-
-
0003386772
-
-
1993, (LNCS 809), pp. 1-17
-
J. L. Massey, "SAFER K-64: A byte oriented block-ciphering algorithm," in Fast Software Encryption, R. Anderson, Ed. Berlin, Germany: Springer, 1993, (LNCS 809), pp. 1-17.
-
"SAFER K-64: A Byte Oriented Block-ciphering Algorithm," in Fast Software Encryption, R. Anderson, Ed. Berlin, Germany: Springer
-
-
Massey, J.L.1
-
21
-
-
0024866111
-
-
1989, pp. 12-24
-
R. Impagliazzo, L. Levin, and M. Luby, "Pseudo-random number generation from one-way functions," in Proc. 21st Annu. Symp. Theory Computing, 1989, pp. 12-24.
-
L. Levin, and M. Luby, "Pseudo-random Number Generation from One-way Functions," in Proc. 21st Annu. Symp. Theory Computing
-
-
Impagliazzo, R.1
-
22
-
-
0023984964
-
-
17, pp. 373-386, 1988
-
M. Luby and C. Rackoff, "How to construct pseudorandom permutations from pseudorandom functions," SIAM J. Comput., vol. 17, pp. 373-386, 1988.
-
"How to Construct Pseudorandom Permutations from Pseudorandom Functions," SIAM J. Comput., Vol.
-
-
Luby, M.1
Rackoff, C.2
-
25
-
-
0022716288
-
-
15, pp. 364-383, 1986
-
L. Blum, M. Blum, and M. Shub, "A simple unpredictable pseudo-random number generator," SIAM J. Comput., vol. 15, pp. 364-383, 1986.
-
M. Blum, and M. Shub, "A Simple Unpredictable Pseudo-random Number Generator," SIAM J. Comput., Vol.
-
-
Blum, L.1
-
27
-
-
84903595110
-
-
1991, pp. 2-21
-
E. Biham and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems," in Advances in Cryptology-CRYPTO'90. Berlin, Germany: Springer-Verlag, 1991, pp. 2-21.
-
"Differential Cryptanalysis of DES-like Cryptosystems," in Advances in Cryptology-CRYPTO'90. Berlin, Germany: Springer-Verlag
-
-
Biham, E.1
Shamir, A.2
-
32
-
-
84996804416
-
-
1994, pp. 26-39
-
B. Kaliski, Jr. and M. Robshaw, "Linear cryptoanalysis using multiple approximations," in Advances in Cryptology-CRYPTO '94. Berlin, Germany: Springer-Verlag, 1994, pp. 26-39.
-
Jr. and M. Robshaw, "Linear Cryptoanalysis Using Multiple Approximations," in Advances in Cryptology-CRYPTO '94. Berlin, Germany: Springer-Verlag
-
-
Kaliski, B.1
-
33
-
-
84947931044
-
-
1996, pp. 224-236
-
L. Knudsen and M. Robshaw, "Non-linear approximations in linear cryptanalysis," in Advances in Cryptology-EUROCRYPT '96. Berlin, Germany: Springer-Verlag, 1996, pp. 224-236.
-
"Non-linear Approximations in Linear Cryptanalysis," in Advances in Cryptology-EUROCRYPT '96. Berlin, Germany: Springer-Verlag
-
-
Knudsen, L.1
Robshaw, M.2
-
34
-
-
1642575733
-
-
1994, pp. 17-26
-
S. Langford and M. Hellman, "Differential-linear cryptanalysis," in Advances in Cryptology-CRYPTO '94. Berlin, Germany: Springer-Verlag, 1994, pp. 17-26.
-
"Differential-linear Cryptanalysis," in Advances in Cryptology-CRYPTO '94. Berlin, Germany: Springer-Verlag
-
-
Langford, S.1
Hellman, M.2
-
35
-
-
84957664477
-
-
1995, pp. 24-38
-
C. Harpes, G. G. Kramer, and J. L. Massey, "A generalization of linear cryptanalysis and the applicability of Matsui' s pilling-up lemma," in Advances in Cryptology-EUROCRYPT '95. Berlin, Germany: Springer-Verlag, 1995, pp. 24-38.
-
G. G. Kramer, and J. L. Massey, "A Generalization of Linear Cryptanalysis and the Applicability of Matsui' S Pilling-up Lemma," in Advances in Cryptology-EUROCRYPT '95. Berlin, Germany: Springer-Verlag
-
-
Harpes, C.1
-
36
-
-
85028910917
-
-
1991, pp. 17-38
-
X. Lai, J. L. Massey, and S. Murphy, "Markov ciphers and differential cryptanalysis," in Advances in Cryptology-EUROCRYPT '91. Berlin, Germany: Springer-Verlag, 1991, pp. 17-38.
-
J. L. Massey, and S. Murphy, "Markov Ciphers and Differential Cryptanalysis," in Advances in Cryptology-EUROCRYPT '91. Berlin, Germany: Springer-Verlag
-
-
Lai, X.1
|